StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Reputation and Privacy Issues in Distributed Computing Information Technology Research Proposal
3 pages (1067 words) , Download 2 , Research Proposal
Free
Dubitsky defines distributed computing as an interconnection between distinct computer elements that are capable of communicating through a common network. These connected systems process and share information to perform a complex task that may otherwise be time-consuming, expensive, or impossible to replicate on a single system.
Preview sample
Privacy-Enhancing Security Mechanisms Information Technology Research Proposal
3 pages (750 words) , Download 3 , Research Proposal
The major concern of every person is that the data should reach the desired person properly. There exist many privacy enhancing security mechanisms that ensure secure delivery of data to the intended location. Effective programming is the key towards design of efficient privacy enhancing mechanisms.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Information Technology: Cyber Security and Information Assurance Information Technology Research Paper
6 pages (1818 words) , Download 6 , Research Paper
Free
Over the past few years, the use of the internet and the World Wide Web has advanced. Most of the activities are performed online ranging from communication, entertainment, shopping, banking, and studying. Data and valuable information is being stored in the servers and this makes them susceptible to hacking. 
Preview sample
What is Hebbian Learning How was it Used by AI Researchers Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
Free
What is Hebbian learning? How was it used by AI researchers? Hebbian learning is an ancient algorithm learning system which is largely based on the biological system dynamics. In Hebbian learning, the relationship between the nodes is represented by adjusted the weight between them.
Preview sample
How New Technology Can Build Competitive Position: Batesville Casket Company Information Technology Case Study
7 pages (2000 words) , Download 2 , Case Study
Free
Batesville Casket Company was committed to providing better service to their customers. They introduced improvements in their existing processes by adapting new technology which placed them at a higher pedestal than their rivals. They had integrated systems that incorporated disparate functions, namely logistics, sales, marketing, and manufacturing.
Preview sample
Network Architecture and Design Information Technology Report
5 pages (1516 words) , Download 2 , Report
Free
Likewise, in this information age, where technology is rapidly evolving, there is a demand of powerful systems that can handle the workload of advance and state of the art applications that are the requirements of end-users. We have selected a case study that incorporates a college that is offering finance and law education.
Preview sample
The Art of Business in the 21st Century Information Technology Essay
7 pages (2019 words) , Download 2 , Essay
Free
Analysis of sales figures can be done with ease through the presentation of visual information which sales managers, can use to make a decision on advertisement campaigns and media to use. ERPs can also integrate suppliers, thereby streamlining the procurement process by reducing the time and effort required to place and process supplier orders.
Preview sample
Different Arguments Suggesting Violent Computer Games are Morally Wrong Information Technology Essay
5 pages (1250 words) , Download 2 , Essay
Free
The viewpoint that takes origin from these games is that some impressionable gamers try to replicate the fictional stories presented in their everyday lives (Morse 2009, p. 83). The author furthers writes that in narrative and goal-oriented gaming, all the pieces of the puzzle fit together at the end and happy endings are always followed by a climax.
Preview sample
Industry Best Practices Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
The fundamental technological evolution has generated remote access mechanism across organizations in different countries. Today, the introduction of several best practices in the field of communication technology has transformed the way information is being shared and managed by people at large.
Preview sample
Certification and accreditation Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
Free
Likewise, the program is delivered by the business owner who hands this program to the chief information officer via chief information security officer in order to decide accreditation that is also known as consultancy for operation. However, there is a requirement of authorization in written, as it will be conducted by the chief information officer before completely implementing information systems and any significant changes that may affect the systems.
Preview sample
JetBlue and WestJet: A Tale of Two IS Projects Information Technology Case Study
3 pages (750 words) , Download 2 , Case Study
Moreover, lack of using support infrastructure to prevent such system breakdown in case the new system develops problems can be disastrous to a company as can be seen in the case of the two companies above. For many years, customers in airline travel have relied on airline reservation systems in booking their tickets, reserving their seats, checking online, or even paying for the tickets.
Preview sample
Impact of New Technology In the Public Sector In England Information Technology Essay
7 pages (1750 words) , Download 2 , Essay
Free
Data collected was analyzed using content analysis by identifying the relevant information. Statistical tests were used to determine the relationships between the variables using SPSS. The aim of this study was to assist the police department and England citizens to improve their services in a way geared towards security empowerment to all involved stakeholders
Preview sample
Network Security for the Athletes Shack Information Technology Essay
5 pages (1449 words) , Download 2 , Essay
Free
Generally, in the past few years network security has turned out to be a serious challenge for the business organizations that heavily rely on business data and information. The basic purpose of implementing a computer network is to allow a number of staff members to enter and update data simultaneously.
Preview sample
Communication Networks Information Technology Assignment
10 pages (2789 words) , Download 3 , Assignment
Free
Ancient empires such as China, Persia, Rome and Greece all made extensive use of writing in terms of the collection and dispersal of information, thereby developing a momentous postal and transmission system through which messages were conveyed. As early as the early 15th century, news was disseminated across the European continent and other regions across the globe (Black, 2001).
Preview sample
The Supervisory Conductor Information Technology Assignment
5 pages (1474 words) , Download 2 , Assignment
Free
All users must have specific passwords that don’t resemble other supervisors at different routes. Microsoft’s AGUDLP approach is more advantageous because it was designed for serving multi-domain forests. This makes it easy for the supervisory conductors to access the different geographical regions.
Preview sample
The Big Data Challenges Information Technology Case Study
4 pages (1222 words) , Download 4 , Case Study
Free
The management of information technology-based infrastructure at Volvo had turned out to be challenging, complicated, and costly. In this scenario, this separation forced the Volvo Car Corporation to develop its own individual information technology infrastructure in order to manage its business areas.
Preview sample
Florida Department of Management Service Information Technology Case Study
4 pages (1157 words) , Download 3 , Case Study
Free
The security mechanisms include IP security and a virtual private network. The virtual private network makes use of special protocols. It makes it possible for users on public networks like the internet to access private networks while at the same time ensuring the security, functionality, and management of such private networks.
Preview sample
An Overview of Big Data Information Technology Research Paper
4 pages (1165 words) , Download 13 , Research Paper
Free
In the past few years, the use of data is growing for carrying out a variety of tasks. Almost all organizations heavily rely on data they collect in different ways. In this scenario, big data is the huge volume of data that is collected from a variety of sources to perform a variety of tasks on it in order to derive some useful facts.
Preview sample
Information Technology and Entrepreneurship in Nielson Norman Group Information Technology Case Study
7 pages (2044 words) , Download 3 , Case Study
Free
Intranets are vital in propelling social media interactions in modern economies. However, the services do not guarantee the acquisition of the set range of results in some fields of study. In entrepreneurship, the intranet serves to deliver different aspects that enhance the knowledge of the companies holds about the employment and service markets.
Preview sample
Advances in Wireless Networks Information Technology Essay
10 pages (2500 words) , Download 3 , Essay
Free
Seeing the growing importance of computer networks in today’s modern world, the management of University of Iland (UoI) has decided to implement a new and more sophisticated network technology structure to better manage university tasks and operations. The basic purpose of this report is to offer a detailed analysis of new wireless network technology implementation at University of Iland (UoI).
Preview sample
Software Development Project Easy Retrieval of Data from Hard Disk Drives Information Technology Research Proposal
7 pages (1955 words) , Download 2 , Research Proposal
Free
Business or technical needs that will be met by the project VI. The boundaries of the project- what the project will not address VII. Detailed implementation of the project VIII. The coding standards IX. Version control policy X. List of the necessary hardware components requirements for the user XI.
Preview sample
Hierarchical Database Models Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
The child segments can have only one parent to maintain the restriction of one-many relationship. The hierarchy is established on the basis of natural record or data relationship. For example an employee usually has its personal data i.e. age, date of birth and joining date etc.
Preview sample
Financial Ratios Computation: Google and Microsoft Information Technology Essay
5 pages (1703 words) , Download 3 , Essay
Free
The financial risk of the company must be analyzed mainly through the leverage factor which is portrayed through the extent of external financing or debt level. If this is higher, the financial risk elevates leading to financial distress costs and insolvency pressures. An appropriate level of debt should be there but it should be monitored.
Preview sample
Techniques Available for Image Encryption Information Technology Research Paper
6 pages (1705 words) , Download 2 , Research Paper
Free
The world today is characterized by a lot of information sharing and data storage. To protect client data and other important company data from potential loss or access by unauthorized personnel, companies go to extremes. It is for this reason that companies and other stakeholders take extreme measures in information hiding. 
Preview sample
Consumer's Safety Concerns when Using Smart Meters Information Technology Dissertation
38 pages (10300 words) , Download 2 , Dissertation
The benefits and advantages of smart meters discussed. The various functions and working of smart meters shall also be highlighted. The report contains a review of the existing solutions proposed to maintain consumer’s privacy and protect smart meters’ data. It also presents some remedial approaches that can be taken to cater to the health concerns that have surfaced through the use of smart meters.
Preview sample
Management Information Systems Information Technology Term Paper
3 pages (750 words) , Download 2 , Term Paper
A good management information system ensures that sound decisions are made concerning issues facing the organization. A MIS is supposed to have a set of guidelines, policies, standards and procedures of the organization, and they should be followed through out the organization during its development and maintenance.
Preview sample
Transnational IT Operations Information Technology Coursework
8 pages (2000 words) , Download 2 , Coursework
Free
The recent developments in information and communication technology especially the Internet, in addition to the capabilities and affordability of IT tools and applications, have changed the ways through which business organizations carry out their business activities both at a national level and globally.
Preview sample
General Systems Theory Information Technology Literature review
6 pages (1769 words) , Download 3 , Literature review
Free
By facilitating trans-disciplinary happenings, systems theory gives legitimacy to the spanning of disciplinary boundaries (Dua & Gangopadhyay 2012). System thinking and systems theory assists the researchers in addressing complex problems. A system can be defined as a set of elements that are interrelated.
Preview sample
Science Fiction and Reality Information Technology Article
7 pages (1961 words) , Download 2 , Article
Free
However, the film is currently owned by the CBS TV studios, and it is distributed under the Paramount home entertainment. The Star Trek is a series in history that reveals classic adventure drama. It began in 1964 on Start Trek TV series, but Roddenberry made it more sophisticated in 1966 (Roddenberry and Abrams 1966).
Preview sample
Value of Information Technology and Management Information System to Accounting Information Technology Research Paper
5 pages (1554 words) , Download 3 , Research Paper
Free
These mainly include different methods, which are based on technology, people management, and decision-making in companies. Nonetheless, management information systems are tools, which a manager uses to collect information about different aspects of the company, including sales and personnel, among others, and analyze it (Moghaddam, et al 2012).
Preview sample
Development of a Virtual World Game Application Information Technology Essay
7 pages (2230 words) , Download 3 , Essay
Free
Strict monitoring of the quality of the management, help the development reduces errors during the development process. Nonetheless, the virtual world game is to be tested for its effectiveness in environmental conservation as well as its application in other sectors. In the future, the team’s priority is to advance in the game to covet energy saving.
Preview sample
Healthy Snacks Information Technology Assignment
13 pages (3250 words) , Download 3 , Assignment
Free
In accordance with the case study, it can be viewed that information was getting shared electronically from the sales order system to the accounting system, but information was also getting shared manually through printouts by the accounting department to the sales team. The author states that more the numbers of manual transactions were taking place.
Preview sample
Security in the Cloud Information Technology Literature review
9 pages (2553 words) , Download 3 , Literature review
Free
Cloud computing is beneficial as it helps to reduce costs and to use a variety of techniques to secure and optimize application performance. As has been noted, the key to successful cloud computing is in striking a balance between business benefits and the hidden potential risks which can adversely affect efficacy.
Preview sample
Chens Landmark Modelling Technique Information Technology Admission/Application Essay
4 pages (1136 words) , Download 2 , Admission/Application Essay
Free
The author of the paper argues in a well-organized manner that the evolution of telecommunication technology along with the process of evolution of high-speed internet and various kinds of technology-enabled gadgets has resulted in the process of transforming the world into a well-connected single entity.
Preview sample
Overview of Agile Software Development Information Technology Term Paper
17 pages (4852 words) , Download 6 , Term Paper
Free
It is believed that agile software development methodologies are not suitable for large size and critical projects. The reason is that the large and critical projects involve the description of critical aspects which are difficult to express unless they are documented or conveyed using a proper language such as UML. In their paper (Paige, et al., 2003)
Preview sample
Data Mining Assignment Information Technology Essay
9 pages (2307 words) , Download 3 , Essay
Free
Most of the time these people are assisted by people whom they trust to perform their transactions who later become the perpetrators. Generally, there are incidences of fraud that have not yet been detected (Borzykowski, 2012 p. 34). With increased cases of fraud, it is high time for effective measures to be applied to combat these crimes for once and for all.
Preview sample
Differences and connections between groupware and ordinary databases, and why they matter Information Technology Essay
19 pages (4750 words) , Download 3 , Essay
Free
Additionally, frequent groupware applications that are simply familiar with nowadays computer clients comprise email server systems, Lotus Notes, and system like that Microsoft Exchange, FirstClass, Livelink, 24Seven Office and Workspot (White, 2011), (Woodard, 2011) and (TechTarget, 1997).
Preview sample
Merging Sora ITV and Mickey ITV Information Technology Case Study
11 pages (2930 words) , Download 2 , Case Study
Free
Sora iTV suites me best because that is what I find more interactive and relevant in my day and age. With Sora iTV, I can discuss with my friends about interesting programs and use my mobile phone for the Chat-Based and WAP applications. Mickey iTV would be boring to my target audience, who are students and friends.
Preview sample
Testing as an Essential Aspect of the Research Information Technology Term Paper
11 pages (2807 words) , Download 2 , Term Paper
Free
The following is an explication of the Diabetic histogram: Fig. 7.1 contains the diabetic attributes through a division between type 1 (blue) and type 2 (red) diabetes. In total there are 240 males and 119 females. As the research clearly demonstrates, the individuals with type 2 diabetes outnumber those with type 1 across both genders.
Preview sample
Information Security Audit and Assurance Information Technology Literature review
11 pages (3092 words) , Download 4 , Literature review
Free
The collection, input, storage, processing and the dissemination of data and information in the organizations database. Increase in the use of information technology in the organization has made the operations and activities in the organization more effective. Data is stored in a database that makes access, retrieval and manipulation easy and more secure (Chrisopher, 2012)
Preview sample
Super Mario Game Information Technology Research Paper
3 pages (750 words) , Download 15 , Research Paper
Free
Unlike the past when we were presented with not so smooth graphics of NES version of Super Mario, the arrival of Nintendo 64 has changed everything. 3D and good visual effects have made playing Mario games a fascinating experience (Bueno, 2009). Describe the nature of the user interface in details for Super Mario game?
Preview sample
Trends in Cybercrime IT Essay Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
Technology attracts a lot of attention due to its uncountable benefits and charms. In this modern age where technology has surpassed itself and the arrival of new gadgets in the market, the craze is even more widespread. Every technology producing company tries to place the best gadget in the market and now not only the technology driven companies have to keep themselves updated.
Preview sample
Development and Research Skills: A Dissertation on Satellite image Classification Information Technology Essay
11 pages (2750 words) , Download 3 , Essay
Free
The use of satellites to observe items have created a clear perspective in the research field with improvement of imagery and observation without coming into contact with the object under consideration (Espinola et al 2008).
Preview sample
Data Communication: 4G Technologies Information Technology Essay
4 pages (1285 words) , Download 2 , Essay
Free
While Wimax extended the journey from the point where 3G standards capacity ended, L.T.E is considered as the torch bearer towards 4G and beyond. It is being dubbed the cover-up for Wimax; it addresses all those areas and weaknesses that can be found in Wimax. It provides higher data rates, increased mobility, and improved encryption techniques. 
Preview sample
A Modern Graphical User Interface in the Windows Operating System Information Technology Assignment
4 pages (1071 words) , Download 3 , Assignment
Free
The use cases of an “Employee” actor include add employees, update employees, add a member (customer, library, employee to lend a book), update member, remover, reserve, and issue book, search and update the catalog. It is pertinent to mention here that the “Employee” actor can perform the same functions of the book to the magazine as well.
Preview sample
Knowledge of Intro to Technologies Information Technology Essay
5 pages (1250 words) , Download 2 , Essay
Free
Generally, technology is gradually becoming known as one of the fastest-changing phenomena of life. Interesting, changes in technology are always focused on making existing technology better. It is not for nothing that the kind of technology that exists today has come to be known as an emerging technology.
Preview sample
The Estimation on the Value of Information Systems Information Technology Dissertation
8 pages (2372 words) , Download 2 , Dissertation
Free
Information systems and technology information have been at the forefront in ensuring quality measurement and accreditation aimed at improving healthcare quality in the UK. Literature reviews on the same indicate that such systems have recorded admirable results when they are applied in situations where hospital compliance with such systems is satisfactory.
Preview sample
Software Development Process Description Information Technology Essay
3 pages (866 words) , Download 2 , Essay
Free
The development of a software product is usually a process that entails extensive research, development, maintenance, modification, re-engineering and other activities to create a well-developed software product. Based on the requirement of a particular project, this process can follow an engineering-based approach, a structured approach.
Preview sample
Impact of Smartphones and Tablets on the Modern Business Information Technology Literature review
5 pages (1844 words) , Download 3 , Literature review
Free
The capacity of business-focused mobile devices shall continue to be on the rise (Ngatuere 2006). The younger executives who are fully in touch with advanced technology shall continue to promote the usage of mobile devices and new technologies as they evolve. The future of connectivity looks unprecedented in terms of scale.
Preview sample
Internet and Distributed Application Services Information Technology Essay
5 pages (1403 words) , Download 2 , Essay
Free
The term cluster is used in computer technology to refer to a group of loosely coupled computers that are configured to work as a unit (Englander, 2003). Every computer within the cluster often operates as a complete unit and not as a tightly coupled multiprocessing system. Clustered computers or nodes have independent Central Processing Unit (CPU), I/O, and memory (Englander, 2003).
Preview sample
8901 - 8950 results of 10276 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us